DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T t

⟦7e9606747⟧ TextFile

    Length: 1096 (0x448)
    Types: TextFile
    Names: »title.tex«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z« 
        └─⟦5c5f5f2d8⟧ 
            └─⟦this⟧ »title.tex« 

TextFile

\begin{titlepage}
\title{Coping with the Threat of Computer Security Incidents \\A
Primer from Prevention through Recovery} 

\date{June 8, 1990}
\author{Russell L. Brand \thanks{Copyright \copyright\ Russell L.
Brand 1989, 1990
Permission to copy and redistribute this information in whole or in part is
granted provided each copy includes attribution and the version
information.  This permission extends for one year minus one day from
June 8, 1990; past that point, the reader should obtain a newer copy of the
article as the information will be out of date. }}

\maketitle


\begin{abstract}
As computer security becomes a more important issue in modern society,
it begins to warrant a systematic approach.  The vast majority of the
computer security problems and the costs associated with them can be
prevented with simple inexpensive measures.  The most important and
cost effective of these measures are available in the prevention and
planning phases.  These methods are presented followed by a simplified
guide to incident handling and recovery.



\end{abstract}

\end{titlepage}